public inbox for gentoo-security@lists.gentoo.org
 help / color / mirror / Atom feed
From: "Daniel A. Avelino" <daavelino@gmail.com>
To: gentoo-security@lists.gentoo.org
Subject: Re: [gentoo-security] No GLSA since January?!?
Date: Fri, 26 Aug 2011 16:27:03 -0300	[thread overview]
Message-ID: <CAKdB2xHV-z4dzkZa6Pw-hSmBbPe_8EN_7vseZdHBvdsPR-X73Q@mail.gmail.com> (raw)
In-Reply-To: <4785038.vCXUPsJWHB@neon>

[-- Attachment #1: Type: text/plain, Size: 2721 bytes --]

Alex.

For WEB vulnerability discovering, one of the most important to us is Nessus
to
search and confronting against CVE database. Sometimes, Nessus find some
vulnerable packages in our Gentoo boxes and when we go to emerge -UDN this,
there is not the updated version even when the fixes are available [in other
distros
for example].

The Core Impact

http://www.coresecurity.com/

do a great job too but we only tested the demo version. [That is great too].

There is other interesting tool [not really WEB related but...] the Secunia
PSI

http://secunia.com/vulnerability_scanning/online/

that do a great job in search unupdated packages but Windows only.

Reading your last answer, I had the impression we are talking about
different things but I think
I can connect them. My apologies to speculate without read the complete team
work documentation
but even if issue correction is not our job as you said, I think we could
pressure package maintainers
to update its packages since we (in thesis) have more visibility about
packages vulnerabilities that can be fixed but
aren't fixed yet. This could be impact even in GLSA's update for example.

So, if we have a automatic mechanism that searchs into vulnerabilities
databases - CVE - for example and find what
packages have issues that was already fixed, we could, for example, label
packages
with some flag that tells users and developers that this package needs
review to fix some vulnerability.

I thought this is an interesting point to discuss because this could in
principle force updates to be more
fast and more Bugzilla-free. I have nothing against Bugzilla but the process
as a whole takes too much time
and we could in principle search vulnerabilities databases and provide
developers and users with informations
about how their systems security are.

Thanks again.

Daniel

On Fri, Aug 26, 2011 at 3:44 PM, Alex Legler <a3li@gentoo.org> wrote:

> On Friday 26 August 2011 15:22:40 Daniel A. Avelino wrote:
> > > When I think about automation, I had in mind something that could help
> >
> > developers to find
> > vulnerabilities in a more fast way [searching and confronting CVE, for
> > example] and  start a
> > "call for solution" process. I work with solutions of this type for WEB
> > vulnerabilities discover
> > and some tools are very interesting to reduce the correction time.
> >
>
> We already use CVE as one of our sources of vulnerability intelligence.
> Finding issues is also not the real issue here.
> Also, actual issue correction is not our job, it's the responsibility of
> the
> package maintainer.
>
> Can you share details about the utilities you are using?
>
> Alex
>
> --
> Alex Legler <a3li@gentoo.org>
> Gentoo Security / Ruby

[-- Attachment #2: Type: text/html, Size: 3401 bytes --]

  reply	other threads:[~2011-08-26 19:28 UTC|newest]

Thread overview: 25+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2011-08-26 16:12 [gentoo-security] No GLSA since January?!? Christian Kauhaus
2011-08-26 16:43 ` Christoph Jasinski
2011-08-26 16:57   ` JD Horelick
2011-08-26 17:18     ` Daniel A. Avelino
2011-08-26 17:57       ` Alex Legler
2011-08-26 18:22         ` Daniel A. Avelino
2011-08-26 18:44           ` Alex Legler
2011-08-26 19:27             ` Daniel A. Avelino [this message]
2011-08-26 16:55 ` Alex Legler
2011-08-26 17:06   ` Christian Kauhaus
2011-08-26 18:00     ` Joost Roeleveld
2011-08-26 18:07       ` Alex Legler
2011-08-26 19:30         ` Joost Roeleveld
2011-08-26 18:08     ` Kevin Bryan
2011-08-26 18:40       ` Alex Legler
2011-08-26 20:02         ` Kevin Bryan
2011-08-26 20:40           ` Daniel A. Avelino
2011-08-26 22:27           ` Alex Legler
2011-08-26 23:38             ` Daniel A. Avelino
2011-08-26 18:41       ` Daniel A. Avelino
2011-08-27  8:49       ` Christian Kauhaus
2011-08-27 12:13         ` Rich Freeman
2011-08-27 12:34           ` Tobias Heinlein
2011-08-27 13:06             ` Rich Freeman
2011-08-27 13:34               ` Tobias Heinlein

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=CAKdB2xHV-z4dzkZa6Pw-hSmBbPe_8EN_7vseZdHBvdsPR-X73Q@mail.gmail.com \
    --to=daavelino@gmail.com \
    --cc=gentoo-security@lists.gentoo.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox